Infosecurity TodayPub Date : 2006-11-01DOI: 10.1016/S1742-6847(06)70485-2
Ken Munro
{"title":"Database security — an oxymoron?","authors":"Ken Munro","doi":"10.1016/S1742-6847(06)70485-2","DOIUrl":"10.1016/S1742-6847(06)70485-2","url":null,"abstract":"<div><p>Penetration testing often reveals the same old security issues, particularly with regard to the configuration and maintenance of databases. Some of these recurrent security problems are generic and affect nearly every database we have tested. Others are associated only with a particular vendor or version.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 42"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70485-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73982065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-11-01DOI: 10.1016/S1742-6847(06)70467-0
Brian McKenna
{"title":"US and UK government documents leak confidential data","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70467-0","DOIUrl":"10.1016/S1742-6847(06)70467-0","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 4"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70467-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84457193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70464-5
Jay Heiser
{"title":"Pity about the people","authors":"Jay Heiser","doi":"10.1016/S1742-6847(06)70464-5","DOIUrl":"10.1016/S1742-6847(06)70464-5","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Page 46"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70464-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75383503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70455-4
Stefan Krempl
{"title":"Universities need lessons in IT security","authors":"Stefan Krempl","doi":"10.1016/S1742-6847(06)70455-4","DOIUrl":"10.1016/S1742-6847(06)70455-4","url":null,"abstract":"<div><p>Hacking incidents mean university leaders have to secure their networks better. But they have to reconcile stricter security with an open computing environment and a user community that is formally required to test their environment to breaking point.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 24-26"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70455-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80470447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70453-0
Danny Bradbury
{"title":"War of the words","authors":"Danny Bradbury","doi":"10.1016/S1742-6847(06)70453-0","DOIUrl":"10.1016/S1742-6847(06)70453-0","url":null,"abstract":"<div><p>Captchas are designed to thwart software bots, but how can you stop them thwarting humans too?</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 14, 16-17"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70453-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82303532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70461-X
Brian Honan
{"title":"IT security – commoditized, badly","authors":"Brian Honan","doi":"10.1016/S1742-6847(06)70461-X","DOIUrl":"10.1016/S1742-6847(06)70461-X","url":null,"abstract":"<div><p>Information security is not just IT security. The better we understand that, the better off we'll be.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Page 41"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70461-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80705395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70456-6
Brian McKenna
{"title":"It's political economy, stupid","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70456-6","DOIUrl":"10.1016/S1742-6847(06)70456-6","url":null,"abstract":"<div><p>Bruce Schneier is an American computer security expert, cryptographer, and writer. His books include <em>Applied Cryptography</em> (1996), <em>Secrets and Lies</em> (2000), and <em>Beyond Fear</em> (2003). He publishes a free monthly newsletter, ‘Cryptogram', and blogs at <span>http://www.schneier.com/blog/</span><svg><path></path></svg>. He is the founder and chief technology officer of Counterpane Internet Security. This autumn he'll be speaking at ISSE 2006 in Rome, on the topic of the economics of security. He recently spoke with Brian McKenna for <em>Infosecurity Today</em>.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 28-29"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70456-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74662496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70454-2
Ron Condon
{"title":"Far from grim up North","authors":"Ron Condon","doi":"10.1016/S1742-6847(06)70454-2","DOIUrl":"10.1016/S1742-6847(06)70454-2","url":null,"abstract":"<div><p>Relative wealth and open social mores give Scandinavians a relaxed attitude to personal infosecurity, but Cold War paranoia and safety concerns have also sharpened their edge in digital security technology.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 20-22"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70454-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77759198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}